Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
The SSH (Secure Shell) Remote Login Protocol
INTRODUCTION <ul><li>SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a...
FEATURES <ul><li>Closes several security holes (e.g., IP, routing, and DNS spoofing).  </li></ul><ul><li>It provides stron...
Examples of what SSH can be used for are: <ul><li>Access to the UNIX-like environment from a Windows machine. </li></ul><u...
<ul><li>Other protocols, such as RSH (remote shell) and Telnet, allow computers to communicate in a similar way to SSH. Th...
RLOGIN(INTRODUCTION) <ul><li>rlogin is also the name of the  application layer protocol  used by the software, part of the...
USE <ul><li>rlogin is most commonly deployed on corporate or academic networks, where user account information is shared b...
SECURITY <ul><li>rlogin has several serious security problems: </li></ul><ul><li>All information, including passwords, is ...
Upcoming SlideShare
Loading in …5
×

Ssh And Rlogin

1,437 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Ssh And Rlogin

  1. 1. The SSH (Secure Shell) Remote Login Protocol
  2. 2. INTRODUCTION <ul><li>SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. </li></ul><ul><li>It provides strong authentication and secure communications over insecure networks. </li></ul>
  3. 3. FEATURES <ul><li>Closes several security holes (e.g., IP, routing, and DNS spoofing). </li></ul><ul><li>It provides strong authentication and secure communications over insecure networks. </li></ul><ul><li>All communications are automatically and transparently encrypted. Encryption is also used to protect integrity. </li></ul><ul><li>Arbitrary TCP/IP ports can be redirected over the encrypted channel in both directions. </li></ul>
  4. 4. Examples of what SSH can be used for are: <ul><li>Access to the UNIX-like environment from a Windows machine. </li></ul><ul><li>Work from home with access to your file store. </li></ul><ul><li>Copying files between your file store and another machine; </li></ul><ul><li>Read restricted web pages </li></ul>
  5. 5. <ul><li>Other protocols, such as RSH (remote shell) and Telnet, allow computers to communicate in a similar way to SSH. These protocols are now considered insecure . </li></ul>
  6. 6. RLOGIN(INTRODUCTION) <ul><li>rlogin is also the name of the  application layer protocol  used by the software, part of the TCP/IP protocol suite. </li></ul><ul><li>Authenticated users can act as if they were physically present at the computer. </li></ul><ul><li>The rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output. </li></ul>
  7. 7. USE <ul><li>rlogin is most commonly deployed on corporate or academic networks, where user account information is shared between all the Unix machines on the network . </li></ul><ul><li>rlogin allows logins without password (where rlogin trusts a remote rlogin client) . </li></ul>
  8. 8. SECURITY <ul><li>rlogin has several serious security problems: </li></ul><ul><li>All information, including passwords, is transmitted unencrypted (making it vulnerable to interception). </li></ul><ul><li>The rlogin file is easy to misuse (potentially allowing  anyone  to login without a password) - for this reason many corporate system administrators prohibit rlogin files and actively search their networks for offenders. </li></ul><ul><li>The protocol partly relies on the remote party's rlogin client providing information honestly (including source port and source host name). A corrupt client is thus able to forge this and gain access, as the rlogin protocol has no means of authenticating other machines' identities, or ensuring that the rlogin client on a trusted machine is the  real  rlogin client. </li></ul>

×